Class 10 Exam  >  Class 10 Notes  >  CBSE Sample Papers For Class 10  >  Class 10 Computer Science: CBSE Sample Question Paper (2023-23) - 3

Class 10 Computer Science: CBSE Sample Question Paper (2023-23) - 3 | CBSE Sample Papers For Class 10 PDF Download

Download, print and study this document offline
Please wait while the PDF view is loading
 Page 1


Sample Question Paper (Term 1) 
Class: X Session: 2021-22 
Computer Applications (Code 165) 
 
Maximum Marks: 25                  Time Allowed: 90 Minutes 
General Instructions: 
1. The Question Paper contains three sections A, B and C. 
2. Section A has 20 questions.  Attempt any 16 questions. 
3. Section B has 20 questions.  Attempt any 16 questions. 
4. Section C has 10 questions.  Attempt any 8 questions. 
5. All questions carry equal marks. 
6. There is no negative marking. 
Q.N. Section-A 
This section consists of 20 questions of MCQ type. Answer any 16 questions. 
1 Which one of the following software comes under Open-Source Software category? 
a. Photoshop 
b. Ms-Paint 
c. Linux 
d. Windows  
2 HTML tag to draw horizontal line: 
a. <hl> 
b. <hr> 
c. <hline> 
d. None of the above 
3 Secure data transmission means 
a) Data is accessible by any unauthorized person during transmission. 
b) Data can not be accessed by any unauthorized person during transmission. 
c) Transmission of data happens easily 
d) Noone can access it 
4 The correct HTML code to display(P+Q)
2   
is: 
a. <SUB>(P+)  2</SUB> 
b. P+Q <SUP>  2 </SUP> 
c. ( P + Q)<SUP> 2 </SUP> 
d. <SUP> (P+Q) 2</SUP> 
5 Which HTML tags cause browsers to render text as italics? 
a. <text style = “italics”></text> 
b. <ital.></ital.> 
c. <i></i> 
d. <b></b>  
 
6 The correct HTML code for inserting an image is : 
a. <img href=”image.gif”> 
b. <img> image.gif</gif> 
c. <image src = “image.gif”> 
d. <img src = “image.gif” > 
Page 2


Sample Question Paper (Term 1) 
Class: X Session: 2021-22 
Computer Applications (Code 165) 
 
Maximum Marks: 25                  Time Allowed: 90 Minutes 
General Instructions: 
1. The Question Paper contains three sections A, B and C. 
2. Section A has 20 questions.  Attempt any 16 questions. 
3. Section B has 20 questions.  Attempt any 16 questions. 
4. Section C has 10 questions.  Attempt any 8 questions. 
5. All questions carry equal marks. 
6. There is no negative marking. 
Q.N. Section-A 
This section consists of 20 questions of MCQ type. Answer any 16 questions. 
1 Which one of the following software comes under Open-Source Software category? 
a. Photoshop 
b. Ms-Paint 
c. Linux 
d. Windows  
2 HTML tag to draw horizontal line: 
a. <hl> 
b. <hr> 
c. <hline> 
d. None of the above 
3 Secure data transmission means 
a) Data is accessible by any unauthorized person during transmission. 
b) Data can not be accessed by any unauthorized person during transmission. 
c) Transmission of data happens easily 
d) Noone can access it 
4 The correct HTML code to display(P+Q)
2   
is: 
a. <SUB>(P+)  2</SUB> 
b. P+Q <SUP>  2 </SUP> 
c. ( P + Q)<SUP> 2 </SUP> 
d. <SUP> (P+Q) 2</SUP> 
5 Which HTML tags cause browsers to render text as italics? 
a. <text style = “italics”></text> 
b. <ital.></ital.> 
c. <i></i> 
d. <b></b>  
 
6 The correct HTML code for inserting an image is : 
a. <img href=”image.gif”> 
b. <img> image.gif</gif> 
c. <image src = “image.gif”> 
d. <img src = “image.gif” > 
7 Which attribute is NOT valid for the <body> tag? 
a. background                                b. color 
c. vlink                                           d. bgcolor 
8 ____________attribute is used to specify the location of an image file. 
a. alt 
b. src 
c. align 
d. name 
9 Which of the following is NOT an example of Intellectual Property rights? 
a. Patent 
b. Trademark 
c. Password 
d. Industrial Design 
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot 
be displayed due to any reason. 
a. alt 
b. alternate 
c. tooltip 
d. text 
11 While creating a Web document, which unit is used to express an image’s height and width?  
a. Centimeters 
b. Pixels 
c. Dots per inch 
d. Inches 
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. 
She uses a technique wherein an actual message (which is in readable form) can be converted into 
an unreadable message. This concept is known as________________ 
a. Encryption 
b. Decryption 
c. Plagiarism 
d. Data Security. 
13 Which is the correct way to comment out something in HTML? 
a. Using ## and # 
 b. Using <!-- and --> 
 c. Using </-- and -/-> 
 d. Using <!-- and -!> 
14 The default alignment of images, that are inserted in Web page, is: 
a. left 
b. right 
c. inline with text 
d. middle 
15 Which of the following techniques can be used for security of data? 
a. Authentication 
b. Authorisation 
c. Encryption 
d. All of the Above 
Page 3


Sample Question Paper (Term 1) 
Class: X Session: 2021-22 
Computer Applications (Code 165) 
 
Maximum Marks: 25                  Time Allowed: 90 Minutes 
General Instructions: 
1. The Question Paper contains three sections A, B and C. 
2. Section A has 20 questions.  Attempt any 16 questions. 
3. Section B has 20 questions.  Attempt any 16 questions. 
4. Section C has 10 questions.  Attempt any 8 questions. 
5. All questions carry equal marks. 
6. There is no negative marking. 
Q.N. Section-A 
This section consists of 20 questions of MCQ type. Answer any 16 questions. 
1 Which one of the following software comes under Open-Source Software category? 
a. Photoshop 
b. Ms-Paint 
c. Linux 
d. Windows  
2 HTML tag to draw horizontal line: 
a. <hl> 
b. <hr> 
c. <hline> 
d. None of the above 
3 Secure data transmission means 
a) Data is accessible by any unauthorized person during transmission. 
b) Data can not be accessed by any unauthorized person during transmission. 
c) Transmission of data happens easily 
d) Noone can access it 
4 The correct HTML code to display(P+Q)
2   
is: 
a. <SUB>(P+)  2</SUB> 
b. P+Q <SUP>  2 </SUP> 
c. ( P + Q)<SUP> 2 </SUP> 
d. <SUP> (P+Q) 2</SUP> 
5 Which HTML tags cause browsers to render text as italics? 
a. <text style = “italics”></text> 
b. <ital.></ital.> 
c. <i></i> 
d. <b></b>  
 
6 The correct HTML code for inserting an image is : 
a. <img href=”image.gif”> 
b. <img> image.gif</gif> 
c. <image src = “image.gif”> 
d. <img src = “image.gif” > 
7 Which attribute is NOT valid for the <body> tag? 
a. background                                b. color 
c. vlink                                           d. bgcolor 
8 ____________attribute is used to specify the location of an image file. 
a. alt 
b. src 
c. align 
d. name 
9 Which of the following is NOT an example of Intellectual Property rights? 
a. Patent 
b. Trademark 
c. Password 
d. Industrial Design 
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot 
be displayed due to any reason. 
a. alt 
b. alternate 
c. tooltip 
d. text 
11 While creating a Web document, which unit is used to express an image’s height and width?  
a. Centimeters 
b. Pixels 
c. Dots per inch 
d. Inches 
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. 
She uses a technique wherein an actual message (which is in readable form) can be converted into 
an unreadable message. This concept is known as________________ 
a. Encryption 
b. Decryption 
c. Plagiarism 
d. Data Security. 
13 Which is the correct way to comment out something in HTML? 
a. Using ## and # 
 b. Using <!-- and --> 
 c. Using </-- and -/-> 
 d. Using <!-- and -!> 
14 The default alignment of images, that are inserted in Web page, is: 
a. left 
b. right 
c. inline with text 
d. middle 
15 Which of the following techniques can be used for security of data? 
a. Authentication 
b. Authorisation 
c. Encryption 
d. All of the Above 
16 Which of the following is not a cybercrime? 
a. Plagiarism 
b. Phishing 
c. using licensed software 
d. hacking 
 
17 _________ is a software for which exclusive rights of modification in the source code remain 
with the owner. 
a. Free Open-Source Software 
b. Freeware 
c. Open-Source Software 
d. Proprietary Software  
 
18.  A _______________ is the right given by the government to an inventor to protect his/ her 
invention from being used/copied for a fixed period of time. 
a. Copyright 
b. Intellectual Property 
c. Patent 
d. Trademark 
 
19 Which of these is NOT an attribute of the font tag? 
a. color 
b. face 
c. type 
d. size 
 
20 The <_________> tag displays text in subscript form. 
a. sub 
b. sup 
c. sups 
d. subs. 
 
 Section-B 
This section contains 20 questions. Answer any 16 questions. 
21 Arun clicks on a link received in a message on his phone which promises him a complimentary 
trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked 
him to do the same. But Panshul refuses and tells Arun that his personal and private information, 
such as online account names, login information and passwords can be stolen and he should be 
careful of such ____________ attacks. 
a. Phishing 
b. Spamming 
c. Scamming 
d. Plagiarism  
Page 4


Sample Question Paper (Term 1) 
Class: X Session: 2021-22 
Computer Applications (Code 165) 
 
Maximum Marks: 25                  Time Allowed: 90 Minutes 
General Instructions: 
1. The Question Paper contains three sections A, B and C. 
2. Section A has 20 questions.  Attempt any 16 questions. 
3. Section B has 20 questions.  Attempt any 16 questions. 
4. Section C has 10 questions.  Attempt any 8 questions. 
5. All questions carry equal marks. 
6. There is no negative marking. 
Q.N. Section-A 
This section consists of 20 questions of MCQ type. Answer any 16 questions. 
1 Which one of the following software comes under Open-Source Software category? 
a. Photoshop 
b. Ms-Paint 
c. Linux 
d. Windows  
2 HTML tag to draw horizontal line: 
a. <hl> 
b. <hr> 
c. <hline> 
d. None of the above 
3 Secure data transmission means 
a) Data is accessible by any unauthorized person during transmission. 
b) Data can not be accessed by any unauthorized person during transmission. 
c) Transmission of data happens easily 
d) Noone can access it 
4 The correct HTML code to display(P+Q)
2   
is: 
a. <SUB>(P+)  2</SUB> 
b. P+Q <SUP>  2 </SUP> 
c. ( P + Q)<SUP> 2 </SUP> 
d. <SUP> (P+Q) 2</SUP> 
5 Which HTML tags cause browsers to render text as italics? 
a. <text style = “italics”></text> 
b. <ital.></ital.> 
c. <i></i> 
d. <b></b>  
 
6 The correct HTML code for inserting an image is : 
a. <img href=”image.gif”> 
b. <img> image.gif</gif> 
c. <image src = “image.gif”> 
d. <img src = “image.gif” > 
7 Which attribute is NOT valid for the <body> tag? 
a. background                                b. color 
c. vlink                                           d. bgcolor 
8 ____________attribute is used to specify the location of an image file. 
a. alt 
b. src 
c. align 
d. name 
9 Which of the following is NOT an example of Intellectual Property rights? 
a. Patent 
b. Trademark 
c. Password 
d. Industrial Design 
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot 
be displayed due to any reason. 
a. alt 
b. alternate 
c. tooltip 
d. text 
11 While creating a Web document, which unit is used to express an image’s height and width?  
a. Centimeters 
b. Pixels 
c. Dots per inch 
d. Inches 
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. 
She uses a technique wherein an actual message (which is in readable form) can be converted into 
an unreadable message. This concept is known as________________ 
a. Encryption 
b. Decryption 
c. Plagiarism 
d. Data Security. 
13 Which is the correct way to comment out something in HTML? 
a. Using ## and # 
 b. Using <!-- and --> 
 c. Using </-- and -/-> 
 d. Using <!-- and -!> 
14 The default alignment of images, that are inserted in Web page, is: 
a. left 
b. right 
c. inline with text 
d. middle 
15 Which of the following techniques can be used for security of data? 
a. Authentication 
b. Authorisation 
c. Encryption 
d. All of the Above 
16 Which of the following is not a cybercrime? 
a. Plagiarism 
b. Phishing 
c. using licensed software 
d. hacking 
 
17 _________ is a software for which exclusive rights of modification in the source code remain 
with the owner. 
a. Free Open-Source Software 
b. Freeware 
c. Open-Source Software 
d. Proprietary Software  
 
18.  A _______________ is the right given by the government to an inventor to protect his/ her 
invention from being used/copied for a fixed period of time. 
a. Copyright 
b. Intellectual Property 
c. Patent 
d. Trademark 
 
19 Which of these is NOT an attribute of the font tag? 
a. color 
b. face 
c. type 
d. size 
 
20 The <_________> tag displays text in subscript form. 
a. sub 
b. sup 
c. sups 
d. subs. 
 
 Section-B 
This section contains 20 questions. Answer any 16 questions. 
21 Arun clicks on a link received in a message on his phone which promises him a complimentary 
trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked 
him to do the same. But Panshul refuses and tells Arun that his personal and private information, 
such as online account names, login information and passwords can be stolen and he should be 
careful of such ____________ attacks. 
a. Phishing 
b. Spamming 
c. Scamming 
d. Plagiarism  
22 Consider the following HTML code: 
<ol type='i'> 
<li>First</li> 
<li>Second</li> 
<li>Third</li> 
<li>Fourth</li> 
</ol> 
 
Choose the correct output that would be shown upon execution of the above code , from the 
choices given below: 
 
 
a.                                                  b.  
                                                           
 
 
 
 
 
 
c.                                                 d.  
 
 
 
 
 
23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. 
One day while browsing the Internet she discovers that another artist has displayed her painting 
portraying it as his own. Which right of Charlene was infringed? 
a.  Digital Privacy right 
b. Intellectual Property right 
c. Digital Property right 
c. Intellectual Privacy right 
24 Which of the following will result in the largest text size? 
a. <H3>                    b. <H6> 
c. <H2>                    d. <H4> 
25 We can create a numbered list using the __________ tag. 
a. <UL>                   b. <list> 
c. <OL>                   d. <DL> 
26 Which of these is NOT an example of Cyber bullying? 
a. Copying a classmate’s personal photo against his/her permission from his social media account 
and sending it to other friends on their emails 
b. Bullying a classmate in the school corridor. 
c. Threatening someone on whatsapp. 
d. Posting mean messages about someone on their social media. 
27 Identify which of the following type of list will create a bulleted list. 
a. Unordered                             b. Ordered 
c. Definition                               d. Numbered  
I.    First 
II.   Second 
III. Third 
IV. Fourth 
 
i.   First 
ii.  Second 
iii. Third 
iv.  Fourth 
 
I     First 
II    Second 
III  Third 
IV  Fourth 
 
i    First 
ii   Second 
iii  Third 
iv   Fourth 
 
Page 5


Sample Question Paper (Term 1) 
Class: X Session: 2021-22 
Computer Applications (Code 165) 
 
Maximum Marks: 25                  Time Allowed: 90 Minutes 
General Instructions: 
1. The Question Paper contains three sections A, B and C. 
2. Section A has 20 questions.  Attempt any 16 questions. 
3. Section B has 20 questions.  Attempt any 16 questions. 
4. Section C has 10 questions.  Attempt any 8 questions. 
5. All questions carry equal marks. 
6. There is no negative marking. 
Q.N. Section-A 
This section consists of 20 questions of MCQ type. Answer any 16 questions. 
1 Which one of the following software comes under Open-Source Software category? 
a. Photoshop 
b. Ms-Paint 
c. Linux 
d. Windows  
2 HTML tag to draw horizontal line: 
a. <hl> 
b. <hr> 
c. <hline> 
d. None of the above 
3 Secure data transmission means 
a) Data is accessible by any unauthorized person during transmission. 
b) Data can not be accessed by any unauthorized person during transmission. 
c) Transmission of data happens easily 
d) Noone can access it 
4 The correct HTML code to display(P+Q)
2   
is: 
a. <SUB>(P+)  2</SUB> 
b. P+Q <SUP>  2 </SUP> 
c. ( P + Q)<SUP> 2 </SUP> 
d. <SUP> (P+Q) 2</SUP> 
5 Which HTML tags cause browsers to render text as italics? 
a. <text style = “italics”></text> 
b. <ital.></ital.> 
c. <i></i> 
d. <b></b>  
 
6 The correct HTML code for inserting an image is : 
a. <img href=”image.gif”> 
b. <img> image.gif</gif> 
c. <image src = “image.gif”> 
d. <img src = “image.gif” > 
7 Which attribute is NOT valid for the <body> tag? 
a. background                                b. color 
c. vlink                                           d. bgcolor 
8 ____________attribute is used to specify the location of an image file. 
a. alt 
b. src 
c. align 
d. name 
9 Which of the following is NOT an example of Intellectual Property rights? 
a. Patent 
b. Trademark 
c. Password 
d. Industrial Design 
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot 
be displayed due to any reason. 
a. alt 
b. alternate 
c. tooltip 
d. text 
11 While creating a Web document, which unit is used to express an image’s height and width?  
a. Centimeters 
b. Pixels 
c. Dots per inch 
d. Inches 
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. 
She uses a technique wherein an actual message (which is in readable form) can be converted into 
an unreadable message. This concept is known as________________ 
a. Encryption 
b. Decryption 
c. Plagiarism 
d. Data Security. 
13 Which is the correct way to comment out something in HTML? 
a. Using ## and # 
 b. Using <!-- and --> 
 c. Using </-- and -/-> 
 d. Using <!-- and -!> 
14 The default alignment of images, that are inserted in Web page, is: 
a. left 
b. right 
c. inline with text 
d. middle 
15 Which of the following techniques can be used for security of data? 
a. Authentication 
b. Authorisation 
c. Encryption 
d. All of the Above 
16 Which of the following is not a cybercrime? 
a. Plagiarism 
b. Phishing 
c. using licensed software 
d. hacking 
 
17 _________ is a software for which exclusive rights of modification in the source code remain 
with the owner. 
a. Free Open-Source Software 
b. Freeware 
c. Open-Source Software 
d. Proprietary Software  
 
18.  A _______________ is the right given by the government to an inventor to protect his/ her 
invention from being used/copied for a fixed period of time. 
a. Copyright 
b. Intellectual Property 
c. Patent 
d. Trademark 
 
19 Which of these is NOT an attribute of the font tag? 
a. color 
b. face 
c. type 
d. size 
 
20 The <_________> tag displays text in subscript form. 
a. sub 
b. sup 
c. sups 
d. subs. 
 
 Section-B 
This section contains 20 questions. Answer any 16 questions. 
21 Arun clicks on a link received in a message on his phone which promises him a complimentary 
trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked 
him to do the same. But Panshul refuses and tells Arun that his personal and private information, 
such as online account names, login information and passwords can be stolen and he should be 
careful of such ____________ attacks. 
a. Phishing 
b. Spamming 
c. Scamming 
d. Plagiarism  
22 Consider the following HTML code: 
<ol type='i'> 
<li>First</li> 
<li>Second</li> 
<li>Third</li> 
<li>Fourth</li> 
</ol> 
 
Choose the correct output that would be shown upon execution of the above code , from the 
choices given below: 
 
 
a.                                                  b.  
                                                           
 
 
 
 
 
 
c.                                                 d.  
 
 
 
 
 
23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. 
One day while browsing the Internet she discovers that another artist has displayed her painting 
portraying it as his own. Which right of Charlene was infringed? 
a.  Digital Privacy right 
b. Intellectual Property right 
c. Digital Property right 
c. Intellectual Privacy right 
24 Which of the following will result in the largest text size? 
a. <H3>                    b. <H6> 
c. <H2>                    d. <H4> 
25 We can create a numbered list using the __________ tag. 
a. <UL>                   b. <list> 
c. <OL>                   d. <DL> 
26 Which of these is NOT an example of Cyber bullying? 
a. Copying a classmate’s personal photo against his/her permission from his social media account 
and sending it to other friends on their emails 
b. Bullying a classmate in the school corridor. 
c. Threatening someone on whatsapp. 
d. Posting mean messages about someone on their social media. 
27 Identify which of the following type of list will create a bulleted list. 
a. Unordered                             b. Ordered 
c. Definition                               d. Numbered  
I.    First 
II.   Second 
III. Third 
IV. Fourth 
 
i.   First 
ii.  Second 
iii. Third 
iv.  Fourth 
 
I     First 
II    Second 
III  Third 
IV  Fourth 
 
i    First 
ii   Second 
iii  Third 
iv   Fourth 
 
28 Which sequence of HTML tags is correct? 
a. <html><head><title></title></head><body></body></html> 
b. <html><head><title><body></title></head></body></html> 
c. <html><head><title</head><body></body>></title></</html> 
d. <html><head><title><body></body ></title></head ></html> 
 
29 Pratham is excited to use a new software which is freely available to download but he cannot 
modify or change the source code. Pratham is using  
a. Freeware 
b. Open-Source Software 
c. Both a and b 
d. None of the above 
 
30 Priyanshu has written the following code snippet as part pf an HTML program.  
 
<B> Mystery Moon </B> 
 
Predict the output of the above from the following: 
a.  Mystery Moon 
b. Mystery Moon 
c. Mystery Moon 
d. Mystery Moon 
 
31 Consider the following code: 
 
<img src="Computers.jpg" width=" ________   " height="________”> 
 
Fill in the blanks to set the image size to be 250pixels wide and 400 pixels tall. 
 
a. 250, 400 
b.400, 250 
c. <250><400> 
d. <400><250> 
 
32 Tag (s) required to create Description lists in HTML: 
a. <DL> 
b. <DT> 
c. <DD> 
d. All of the above 
 
33 Which of the following is NOT a reason for the digital divide in different demographic regions? 
a. Cost of Technology 
b. Lack of information 
c. Lack of access to high performance computers 
d. Lack of access to the disabled. 
 
Read More
303 docs|7 tests

Top Courses for Class 10

303 docs|7 tests
Download as PDF
Explore Courses for Class 10 exam

Top Courses for Class 10

Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev
Related Searches

shortcuts and tricks

,

past year papers

,

Semester Notes

,

Extra Questions

,

Exam

,

MCQs

,

ppt

,

Class 10 Computer Science: CBSE Sample Question Paper (2023-23) - 3 | CBSE Sample Papers For Class 10

,

Viva Questions

,

Important questions

,

Objective type Questions

,

study material

,

Class 10 Computer Science: CBSE Sample Question Paper (2023-23) - 3 | CBSE Sample Papers For Class 10

,

video lectures

,

mock tests for examination

,

Free

,

Class 10 Computer Science: CBSE Sample Question Paper (2023-23) - 3 | CBSE Sample Papers For Class 10

,

Summary

,

pdf

,

Previous Year Questions with Solutions

,

Sample Paper

,

practice quizzes

;